Skip to content

ios-xr/key-package-scripts

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

25 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

This page summarizes the process of creation of Key Package

    - key-pkg-ver-1 should be used for XR releases 76x and 77x
    - key-pkg-ver-2 should be used for XR releases 78x till 25.4x
    - key-pkg-ver-3 should be used for XR releases 26.1.1 and above

Why is Key Package needed.

Key-package is a conduit used to securely onboard public/verification keys of 3rd party non-cisco customers, onto XR devices. The end goal of Key Package infrastructure is to provide the user a secure mechanism to install Customer keys (either GPG or X509). These keys can be used to securely onboard a customer signed software or to sign Customer Consent Requests (CT).

What is Key Package

Key package is a CMS file (Cryptographic Message Syntax - RFC5652) which is digitally signed by the Ownership Certificate (OC). The payload is a json file with customer/3rd party keys which are to be onboarded onto the system.

Pre-requisites - Establish Device Ownership

A customer has to establish device ownership, as part of which the Ownership Certificate (OC) will be installed into hardware secure storage (TAM) of the customer’s router. Without device ownership established, one cannot install 3rd party key packages onto the system.

Confirm device ownership is established by issuing command: "show platform security device-ownership"


About

Scripts to generate key-package for IOS-XR

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors